• 537 Citations
  • 13 h-Index
1995 …2022

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Adding Cyberattacks To An Industry-Leading CAN Simulator

Hayward, J., Tomlinson, A. J. & Bryans, J., 7 Oct 2019, Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019. IEEE Computer Society, p. 9-16 8 p. 8859515

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
19 Downloads (Pure)

A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example

Fowler, D. S., Bryans, J., Cheah, M., Wooderson, P. & Shaikh, S., 7 Oct 2019, Proceedings - Companion of the 19th IEEE International Conference on Software Quality, Reliability and Security, QRS-C 2019. IEEE Computer Society, 8 p. 8859491

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
130 Downloads (Pure)

An Evaluation Ontology Applied to Connected Vehicle Security Assurance

Powley, S., Perry, S., Holt, J. & Bryans, J., 27 Sep 2019, INCOSE International Symposium: The Proceedings of the Annual INCOSE International Symposium. 1 ed. USA: Wiley, Vol. 29. p. 37-52 16 p. (INCOSE Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

A Template-based Method for the Generation of Attack Trees

Bryans, J., Liew, L. S., Nguyen, H. N., Sabaliauskaite, G., Shaikh, S. & Zhou, F., 14 Nov 2019, (Accepted/In press).

Research output: Contribution to conferencePaper

Attack Defense Trees with Sequential Conjunction

Nguyen, H. N., Bryans, J. & Shaikh, S., 25 Mar 2019, Proceedings - 19th IEEE International Symposium on High Assurance Systems Engineering, HASE 2019. Jiang, C., Nguyen, V. & Yu, D. (eds.). IEEE, Vol. 2019-January. p. 247-252 6 p. (Proceedings / IEEE International Symposium on High-Assurance Systems Engineering. IEEE International Symposium on High-Assurance Systems Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
1 Citation (Scopus)
52 Downloads (Pure)

Communication in Emergency Management through Data Integration and Trust: an introduction to the CEM-DIT system

McNeill, F., Bental, D., Missier, P., Steyn, J., Kumar, T. & Bryans, J., 25 Mar 2019, (Accepted/In press) Proceedings of International Conference on Informations Systems for Crises Response and Management.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
12 Downloads (Pure)

Enabling security checking of automotive ECUs with formal CSP models

Heneghan, J., Shaikh, S. A., Bryans, J., Cheah, M. & Wooderson, P., 22 Aug 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019. IEEE, p. 90-97 8 p. 8805994. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop, DSN-W 2019).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
6 Downloads (Pure)
2018

Building an automotive security assurance case using systematic security evaluations

Cheah, M., Shaikh, S., Bryans, J. & Wooderson, P., Aug 2018, In : Computers and Security. 77, p. 360-379 20 p.

Research output: Contribution to journalArticle

Open Access
File
5 Citations (Scopus)
151 Downloads (Pure)

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows

Tomlinson, A., Bryans, J., Shaikh, S. A. & Kalutarage, H. K., 23 Jul 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2018. Luxembourg: IEEE, p. 231-238 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

8 Citations (Scopus)

Formalising Systematic Security Evaluations using Attack Trees for Automotive Applications

Cheah, M., Nguyen, H. N., Bryans, J. & Shaikh, S., 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) September 28-29, 2017, Crete, Greece. Springer, p. 113-129 (Security and Cryptology; vol. 10741).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

4 Citations (Scopus)

Towards Viable Intrusion Detection Methods For The Automotive Controller Area Network

Tomlinson, A. J., Bryans, J. & Shaikh, S., 13 Sep 2018, 2nd Computer Science in Cars Symposium - Future Challenges in Artificial Intelligence Security for Autonomous Vehicles (CSCS 2018). ACM, 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Using A One-Class Compound Classifier To Detect In-Vehicle Network Attacks

Tomlinson, A. J., Bryans, J. & Shaikh, S., 6 Jul 2018, Proceedings of the Genetic and Evolutionary Computation Conference Companion. Association for Computing Machinery (ACM), p. 1926-1929 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
5 Citations (Scopus)
24 Downloads (Pure)
2017

The Internet of Automotive Things: Vulnerabilities, risks and policy implications

Bryans, J., 2017, In : Journal of Cyber Policy. 2, 2, p. 185-194 9 p.

Research output: Contribution to journalArticle

Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study

Cheah, M., Bryans, J., Fowler, D. S. & Shaikh, S. A., 30 Aug 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W). Institute of Electrical and Electronics Engineers Inc., p. 36-43 8 p. 8023695

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

1 Citation (Scopus)

Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications: An Empirical Study

Cheah, H., Bryans, J., Fowler, D. S. & Shaikh, S., 15 Apr 2017, (Accepted/In press). 8 p.

Research output: Contribution to conferencePaper

Towards A Testbed for Automotive Cybersecurity

Fowler, D. S., Cheah, H., Shaikh, S. & Bryans, J., 18 May 2017, 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). IEEE, p. 540-541 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Open Access
File
14 Citations (Scopus)
396 Downloads (Pure)
2016

Applying Model-based SE Techniques for Dependable Land Systems

Payne, R., Fitzgerald, J., Bryans, J. & Winthorpe, E., 13 Sep 2016, p. 1783–1798.

Research output: Contribution to conferencePaper

Open Access
File
34 Downloads (Pure)

Combining Third Party Components Securely in Automotive Systems

Cheah, H., Shaikh, S., Bryans, J. & Nguyen, H. N., Sep 2016, Information Security Theory and Practice. Foresti, S. & Lopez, J. (eds.). Springer Verlag, Vol. 9895 LNCS. p. 262-269

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

5 Citations (Scopus)
2015

Access control and view generation for provenance graphs

Danger, R., Curcin, V., Missier, P. & Bryans, J., Aug 2015, In : Future Generation Computer Systems. 49, p. 8-27 20 p.

Research output: Contribution to journalArticle

Open Access
File
8 Citations (Scopus)
40 Downloads (Pure)

A Model-Based Approach for Requirements Engineering for Systems of Systems

Holt, J., Perry, S., Payne, R., Bryans, J., Hallerstede, S. & Hansen, F. O., Mar 2015, In : IEEE Systems Journal. 9, 1, p. 252-262 11 p.

Research output: Contribution to journalArticle

File
21 Citations (Scopus)
807 Downloads (Pure)

A proof-based method for modelling timed systems

Iliasov, A. & Bryans, J., 19 Apr 2015, International Andrei Ershov Memorial Conference on Perspectives of System Informatics. Berlin: Springer Verlag, Vol. 8974. p. 161-176 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Provabs: Model, policy, and tooling for abstracting PROV graphs

Missier, P., Bryans, J., Gamble, C., Curcin, V. & Danger, R., 2015, Provenance and Annotation of Data and Processes. Springer, Vol. 8628. p. 3-15 13 p. (Lecture Notes in Computer Science ; vol. 8628).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

11 Citations (Scopus)

ProvAbs: Model, Policy, and Tooling for Abstracting PROV Graphs

Missier, P., Bryans, J., Gamble, C., Curcin, V. & Danger, R., 21 Mar 2015, Provenance and Annotation of Data and Processes. Ludäscher, B. & Plale, B. (eds.). Cham: Springer Verlag, Vol. 8628. p. 3-15 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

2014

Collaborative systems of systems need collaborative design

Fitzgerald, J., Bryans, J., Larsen, P. G. & Salim, H., 2014, Collaborative Systems for Smart Networked Environments: 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, Amsterdam, The Netherlands, October 6-8, 2014. Proceedings. Camarinha-Matos, L. M. & Afsarmanesh, H. (eds.). Berlin: Springer, Vol. 434. p. 16-23 8 p. (IFIP Advances in Information and Communication Technology).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Leadership election: An Industrial SoS application of compositional deadlock verification

Antonino, P. R. G., Oliveira, M. M., Sampaio, A. C. A., Kristensen, K. E. & Bryans, J. W., 2014, NASA Formal Methods. Badger, J. M. & Rozier, K. Y. (eds.). Springer Verlag, Vol. 8430 LNCS. p. 31-45 16 p. (Lecture Notes in Computer Science; vol. 8430).

Research output: Chapter in Book/Report/Conference proceedingChapter

10 Citations (Scopus)

Maintaining Emergence in Systems of Systems Integration: a Contractual Approach using SysML

Bryans, J., Fitzgerald, J., Payne, R. & Kristensen, K., 2014, In : INCOSE International Symposium. 24, 1, p. 166-181

Research output: Contribution to journalArticle

Open Access

SysML contracts for systems of systems

Bryans, J., Fitzgerald, J., Payne, R., Miyazawa, A. & Kristensen, K., 2014, 2014 9th International Conference on System of Systems Engineering (SOSE). IEEE, p. 73-78 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

13 Citations (Scopus)
2013

Semi-formal and formal interface specification for system of systems architecture

Bryans, J., Payne, R., Holt, J. & Perry, S., 2013, 2013 IEEE International Systems Conference (SysCon). IEEE, p. 612-619 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

18 Citations (Scopus)

Towards quantitative analysis of opacity

Bryans, J. W., Koutny, M. & Mu, C., 2013, Trustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, Revised Selected Papers (Lecture Notes in Computer Science). Palamidessi, C. & Ryan, M. D. (eds.). Heidelberg: Springer, Vol. 8191 LNCS. p. 145-163 19 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)
2012

A formal model-based approach to engineering systems-of-systems

Fitzgerald, J., Bryans, J. & Payne, R., 2012, Collaborative Networks in the Internet of Services. Camarinha-Matos, L. M., Xu, L. & Afsarmanesh, H. (eds.). Berlin: Springer Verlag, Vol. 380 AICT. p. 53-62 10 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 380).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

11 Citations (Scopus)

Interface specification for system-of-systems architectures

Payne, R., Bryans, J., Fitzgerald, J. & Riddle, S., 2012, 2012 7th International Conference on System of Systems Engineering (SoSE). IEEE, p. 567-572 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

5 Citations (Scopus)
2011

Developing a consensus algorithm using stepwise refinement

Bryans, J. W., 2011, Formal Methods and Software Engineering. Qin, S. & Qiu, Z. (eds.). Berlin: Springer Verlag, Vol. 6991 LNCS. p. 553-568 16 p. (Lecture Notes in Computer Science; vol. 6991).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

3 Citations (Scopus)

Refinement-based techniques in the analysis of information flow policies for dynamic virtual organisations

Bryans, J. W., Fitzgerald, J. S. & McCutcheon, T., 2011, In : IFIP Advances in Information and Communication Technology. 362 AICT, p. 314-321 8 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2010

Formal analysis of BPMN models using event-B

Bryans, J. W. & Wei, W., 2010, Formal Methods for Industrial Critical Systems. Kowalewski, S. & Roveri, M. (eds.). Berlin: Springer Verlag, Vol. 6371 LNCS. p. 33-49 17 p. (FMICS: International Workshop on Formal Methods for Industrial Critical Systems; vol. 6371).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

16 Citations (Scopus)

Patterns for modelling time and consistency in business information systems

Bryans, J. W., Fitzgerald, J. S., Romanovsky, A. & Roth, A., 11 Nov 2010, 2010 15th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, p. 105-114 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

10 Citations (Scopus)
2009

Formal modelling and analysis of business information applications with fault tolerant middleware

Bryans, J., Fitzgerald, J., Romanovsky, A. & Roth, A., 23 Jun 2009, International Conference on Engineering of Complex Computer Systems. IEEE, p. 68-77 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

8 Citations (Scopus)
2008

GOLD infrastructure for virtual organizations

Periorellis, P., Cook, N., Hiden, H., Conlin, A., Hamilton, M. D., Wu, J., Bryans, J., Gong, X., Zhu, F., Smith, R., Watson, P. & Wright, A. R., 2008, In : Concurrency Computation Practice and Experience. 20, 11, p. 1273-1288 16 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Opacity generalised to transition systems

Bryans, J. W., Koutny, M., Mazaro, L. & Ryan, P. Y. A., Nov 2008, In : International Journal of Information Security. 7, 6, p. 421-435 15 p.

Research output: Contribution to journalArticle

113 Citations (Scopus)
2007

Formal Engineering of XACML Access Control Policies in VDM++

Bryans, J. W. & Fitzgerald, J. S., 2007, Formal Methods and Software Engineering. Butler, M., Hinchey, M. G. & Larrondo-Petrie, M. M. (eds.). Berlin: Springer Verlag, Vol. 4789 LNCS. p. 37-56 20 p. (Lecture Notes in Computer Science; vol. 4789).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

12 Citations (Scopus)

Formal modelling of dynamic coalitions, with an application in chemical engineering

Bryans, J. W., Fitzgerald, J. S., Jones, C. B. & Mozolevsky, I., 2007, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. IEEE, p. 91-98 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

2006

E-voting: Dependability requirements and design for dependability

Bryans, J. W., Littlewood, B., Ryan, P. Y. A. & Strigini, L., 2006, ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security. ACM, Vol. 2006. p. 988-995 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

13 Citations (Scopus)

Opacity generalised to transition systems

Bryans, J. W., Koutny, M., Mazaro, L. & Ryan, P. Y. A., 2006, Formal Aspects in Security and Trust. Dimitrakos, T., Martinelli, F., Ryan, P. Y. A. & Schneider, S. (eds.). Berlin: Springer Verlag, Vol. 3866 LNCS. p. 81-95 15 p. (Lecture Notes in Computer Science (LNCS); vol. 3866).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

45 Citations (Scopus)
2005

Modelling dynamic opacity using Petri Nets with silent actions

Bryans, J. W., Koutny, M. & Ryan, P. Y. A., 2005, Formal Aspects in Security and Trust. Dimitrakos, T. & Martinelli, F. (eds.). Boston: Springer Verlag, Vol. 173. p. 159-172 14 p. (IFIP International Federation for Information Processing (IFIPAICT); vol. 173).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

13 Citations (Scopus)

Modelling opacity using petri nets

Bryans, J. W., Koutny, M. & Ryan, P. Y. A., 10 Feb 2005, In : Electronic Notes in Theoretical Computer Science. 121, p. 101-115 15 p.

Research output: Contribution to journalArticle

Open Access
File
79 Citations (Scopus)
10 Downloads (Pure)

Reasoning about XACML policies using CSP

Bryans, J., 2005, SWS '05 Proceedings of the 2005 workshop on Secure web services. ACM, p. 28-35 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

27 Citations (Scopus)
2004

Expressing iterative properties logically in a symbolic setting

Shankland, C., Bryans, J. & Morel, L., 2004, Algebraic Methodology and Software Technology. Rattray, C., Maharaj, S. & Shankland, C. (eds.). Berlin, Vol. 3116. p. 460-474 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

2003

Model checking stochastic automata

Bryans, J., Bowman, H. & Derrick, J., 2003, In : ACM Transactions on Computational Logic. 4, 4, p. 452-492 41 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)
2001

Analysis of a multimedia stream using stochastic process algebra

Bowman, H., Bryans, J. W. & Derrick, J., 1 Jan 2001, In : Computer Journal. 44, 4, p. 230-245 16 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Specification and analysis of automata-based designs

Bryans, J., Blair, L., Bowman, H. & Derrick, J., 1 Jun 2001, Integrated Formal Methods. Grieskamp, W., Santen, T. & Stoddart, B. (eds.). Berlin: Springer Verlag, Vol. 1945 LNCS. p. 176-193 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding